Data sovereignty: Keeping your data close in the UK

A study by CNS Group found that 92 percent of IT security professionals said it is important to store, access and back up data in the UK. However, only 27 percent were very certain that their data did actually remain in the UK at all times. With Brexit and emerging data protection laws on the horizon, such as the EU General Data Protection Regulation, UK organisations of all sizes will need to know where in the world their data is stored and managed. If comprehensive questions about data sovereignty are not already part of your data governance strategy, they should be.

A quarter of IT professionals are not confident about their organisation’s security incident response plans. Despite this lack of confidence, respondents were very aware of the impact a breach can have. Join our webinar to find out the top five things you should do when a breach occurs, before calling in the experts.

In this fourth panel discussion from CNS Group's Security Chapter event in September, Kevin Dowd, Chairman, CNS Group leads a discussion on whether there is an ICO standard Cyber Insurance companies should be adhering to.

In this third panel discussion from CNS Group's Security Chapter event in September, Kevin Dowd, Chairman, CNS Group leads a discussion on the questions you should be asking your cloud-based services, or security provider.

Kevin Dowd, Chairman, CNS Group chaired a panel at our last Security Chapter event. This discussion looked at whether or not organisation's have a good view of their data and how it's governed. The panel included:
- Garreth Cameron, Group Manager of Business and Industry, ICO
- Joe Hancock, Cyber Security Lead, Mishcon de Reya LLP
- Dr Sandra Bell, Head of Resilience Consulting, Sungard Availability Services

To find out more about CNS Group's Managed Security Services, visit: http://bit.ly/2fUrs2d

Shannon Simpson, CEO, CNS Group, discusses why data sovereignty is of increasing concern, especially with the EUGDPR on the horizon.

A study by CNS Group found that 92 percent of IT security professionals said it is important to store, access and back up data in the UK. However, only 27 percent were very certain that their data did actually remain in the UK at all times. With Brexit and emerging data protection laws, UK organisations of all sizes will need to know where in the world their data is stored and managed. If comprehensive questions about data sovereignty are not already part of your data governance strategy, they should be.

A study by CNS Group found that 92 percent of IT security professionals said it is important to store, access and back up data in the UK. However, only 27 percent were very certain that their data did actually remain in the UK at all times. With Brexit and emerging data protection laws on the horizon, such as the EU General Data Protection Regulation, UK organisations of all sizes will need to know where in the world their data is stored and managed. If comprehensive questions about data sovereignty are not already part of your data governance strategy, they should be.

Whether you refer to them as Supervisory Control and Data Acquisition, Industrial Control Systems, Machine Interface, Remote Terminal Unit, Programmable Logic Controller, Internet of Things - these systems underpin many of the manufacturing processes that make modern day life possible from water treatment, steel mills, nuclear power stations, elevator shafts, cars, trains to planes.

Yet, when compared with other more common networking protocols, they are often considered “basic”. However the risks and results of compromise are far more grave than other more protected systems.

Testing such system requires specialist skills but that doesn’t mean it’s any more expensive or inaccessible than testing any other system. Learn in this presentation:

- How systems should be tested
- How to conduct relevant risk analysis
- What can happen if an attack takes place
- How some of the most widely reported attacks happened
- What you can do to avoid breach

We're at a critical point in cyber defence - our webinar will cut through the hype and scare mongering about Cyber Security - arming you with a practical guide to cyber security best practices and sharing practical tips and advice around:-

• Who is attacking you and how to recognise different types of attack?
• Evaluating different approaches to create a strong cyber security posture – the relative costs and value
• 5 simple actions every company can take today to mitigate risk
• How to ensure your business partners and other 3rd parties don’t become a cyber risk

As a government accredited company, we help UK organisations of all sizes build cyber security capabilities and maintain compliance through practical consulting and managed services.